Table of Contents
RUGGEDCOM WIN
User Guide
iv
Chapter 3
17
3.1 Configuring Syslog ...................................................................................................................... 17
3.2 Viewing Device Hardware Information .......................................................................................... 18
3.3 Viewing Statistics ........................................................................................................................ 18
3.3.1 Viewing General Statistics ................................................................................................. 19
3.3.2 Viewing and Clearing RF Statistics ..................................................................................... 20
3.3.3 Viewing and Clearing Network Statistics ............................................................................ 21
3.3.4 Viewing and Clearing Service Flow Statistics ...................................................................... 22
3.4.1 Upgrading Device Software ............................................................................................... 23
3.4.2 Viewing Software Properties ............................................................................................. 24
3.4.3 Loading the Primary Software Version ............................................................................... 25
3.4.4 Loading the Secondary Software Version ........................................................................... 26
3.4.5 Configuring the Primary Software Version .......................................................................... 27
3.4.6 Downloading Software from an FTP Server ........................................................................ 28
3.4.7 Managing Memory Banks ................................................................................................. 28
3.4.7.1 Viewing Memory Bank Files ................................................................................... 29
3.4.7.2 Uploading Files to the FTP Server ........................................................................... 30
3.4.7.3 Copying Files to the Secondary Bank ...................................................................... 31
3.4.7.4 Deleting Memory Bank Files ................................................................................... 32
3.4.8 Viewing the Status of an Operation ................................................................................... 32
3.4.9 Canceling an Operation .................................................................................................... 33
Chapter 4
35
4.1 Configuring the Device Name ...................................................................................................... 35
4.2 Managing Links .......................................................................................................................... 36
4.2.1 Configuring Link WatchDog .............................................................................................. 36
4.2.2 Configuring Link Timeout ................................................................................................. 37
4.3 Changing the Administrator Password .......................................................................................... 38
4.4 Configuring the Maximum Number of Login Attempts ................................................................... 39
4.5 Rebooting the Device .................................................................................................................. 39
4.6 Restoring Factory Defaults ........................................................................................................... 40
4.7 Managing Users .......................................................................................................................... 41
4.7.1 Adding Users ................................................................................................................... 41
4.7.2 Deleting Users ................................................................................................................. 42
4.8 Enabling/Disabling SSH Shell Access ............................................................................................. 42
4.9 Managing Keys and Certificates ................................................................................................... 43